🌙 CS_security

1.학기시작!

post-thumbnail

2.1. Introduction - Cryptology and its objects

post-thumbnail

3.1. Introduction - Basic Cryptographic Tools

post-thumbnail

4.2. History of Cryptography

post-thumbnail

5.3. Network and Systems

post-thumbnail

6.4. Theory of Secure Communication - part 1

post-thumbnail

7.4. Theory of Secure Communication - part 2

post-thumbnail

8.5. Conventional Cryptography Systems (1) - baseground

post-thumbnail

9.5. Conventional Cryptography Systems(2) - transposition, substitution, feistel

post-thumbnail

10.5. Conventional Cryptography Systems(3) - DES, AES

post-thumbnail

11.6. Basic Mathmatics for Cryptography - Euclid's Algorithm & Fermat's Little Theorem & Euler's Theorem

post-thumbnail

12.6. Basic Mathmatics for Cryptography - randomness

post-thumbnail

13.7. Public Key Cryptography - RSA

post-thumbnail

14.7. Public Key Cryptography - Diffie Hellman Key Exchange

post-thumbnail

15.07. Public Key Cryptography - Elgamal public key

post-thumbnail

16.07. Public Key Cryptography - Digital Signature

post-thumbnail

17.7. Public Key Cryptography - Eliptic curve

post-thumbnail

18.10. standard and applications - Basic Security Protocols (network layer : IPSec)

post-thumbnail

19.10. standard and applications - Basic Security Protocols (Transport layer - SSL, TLS)

post-thumbnail

20.10. standard and applications - Basic Security Protocols (operational security : firewall, intruders)

post-thumbnail

22.10. Standards and Applications - Distributed System Security Protocols

post-thumbnail

23.12. Advanced Crptographic Techniques : Secrete Sharing

post-thumbnail

24.12. Advanced Cryptographic Techniques : Privacy Preserving Protocols

post-thumbnail